NIST Cybersecurity Framework Manufacturing Implementation



Similar documents
Industrial Control Systems Security Guide

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Cybersecurity Framework: Current Status and Next Steps

Feature. SCADA Cybersecurity Framework

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Facilitated Self-Evaluation v1.0

Roadmaps to Securing Industrial Control Systems

Framework for Improving Critical Infrastructure Cybersecurity

FISMA Implementation Project

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Framework for Improving Critical Infrastructure Cybersecurity

Risk Management in Practice A Guide for the Electric Sector

Cyber Security Risk Management: A New and Holistic Approach

Which cybersecurity standard is most relevant for a water utility?

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

Building Insecurity Lisa Kaiser

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

May 2015 FDT Group Update

Water Sector Approach to Cybersecurity Risk Management

An Evaluation of Security Posture Assessment Tools on a SCADA Environment

How To Protect Water Utilities From Cyber Attack

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

ISACA rudens konference

Help for the Developers of Control System Cyber Security Standards

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity

NERC CIP VERSION 5 COMPLIANCE

NIST Cybersecurity Framework. ARC World Industry Forum 2014

SCADA System Overview

Cyber Security Implications of SIS Integration with Control Networks

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

IBM QRadar Security Intelligence April 2013

future data and infrastructure

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

1 ISA Security Compliance Institute

FREQUENTLY ASKED QUESTIONS

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

Process Control System Cyber Security Standards an Overview

Program Overview and 2015 Outlook

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM

SCADA Security Training

Assessing the Effectiveness of a Cybersecurity Program

Cybersecurity Risk Assessment in Smart Grids

This is a preview - click here to buy the full publication

Securing The Connected Enterprise

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Managing Security Risk In a World of Complex Systems and IT Infrastructures

NIST Cyber Security Activities

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

Framework for Improving Critical Infrastructure Cybersecurity

Does Aligning Cyber Security and Process Safety Reduce Risk?

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

Rethinking Cyber Security for Industrial Control Systems (ICS)

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Looking at the SANS 20 Critical Security Controls

Building Security In:

A Systems Approach to HVAC Contractor Security

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications

Panel Session: Lessons Learned in Smart Grid Cybersecurity

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

ISA-99 Industrial Automation & Control Systems Security

Cyber Security and Privacy - Program 183

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

Security Issues with Integrated Smart Buildings

IEEE-Northwest Energy Systems Symposium (NWESS)

NERC CIP Tools and Techniques

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Transcription:

NIST Cybersecurity Framework Manufacturing Implementation Keith Stouffer Project Leader, Cybersecurity for Smart Manufacturing Systems Engineering Lab, NIST

Manufacturing Cybersecurity Research at NIST Develop a Manufacturing Cybersecurity Framework (CSF) Profile for various manufacturing scenarios Implement Manufacturing CSF Profile in the NIST Cybersecurity for Smart Manufacturing Testbed Measure performance impact of various cybersecurity solutions to meet the Manufacturing CSF Profile Develop guidance on how to implement the NIST CSF in manufacturing environments without having negative performance impacts Collaborate with Manufacturing Extension Partnership (MEP) and National Cybersecurity Center of Excellence (NCCoE) to develop cybersecurity guidance for small and medium sized manufacturers that is actionable and not overwhelming

Cybersecurity Framework Components Aligns industry standards and best practices to the Framework Core in a particular implementation scenario Cybersecurity activities and informative references, organized around particular outcomes Supports prioritization and measurement while factoring in business needs Framework Profile Framework Core Enables communication of cyber risk across an organization Framework Implementation Tiers Describes how cybersecurity risk is managed by an organization and degree the risk management practices exhibit key characteristics

Cybersecurity Framework Profile Aligns industry standards and best practices to the Framework Core in a particular implementation scenario Supports prioritization and measurement while factoring in business needs Framework Profile Develop and Implement a Manufacturing Profile of the Cybersecurity Framework

NIST Special Publication 800-82 Guide to Industrial Control Systems Security Provides guidance for establishing secure ICS, while addressing unique performance, reliability, and safety requirements, including implementation guidance for NIST SP 800-53 controls Initial draft - September 2006 Revision 1 - May 2013 Revision 2 - May 2015

NIST Special Publication 800-82 Guide to Industrial Control Systems Security Provide guidance for establishing secure ICS, including implementation guidance for NIST SP 800-53 security controls Content Overview of ICS ICS Risk Management and Assessment ICS Security Program Development and Deployment ICS Security Architecture Applying Security Controls to ICS Threat Sources, Vulnerabilities and Incidents Current Activities in Industrial Control Systems Security ICS Security Capabilities and Tools ICS Overlay for NIST SP 800-53, Rev 4 security controls Downloaded over 3,000,000 times since 2006 initial release and is heavily referenced by the public and private ICS security community worldwide

ICS Overlay The ICS overlay is a partial tailoring of the controls and three control baselines in SP 800-53, Revision 4, and adds supplementary guidance specific to ICS. The concept of overlays is introduced in Appendix I of SP 800-53, Revision 4. The ICS overlay is intended to be applicable to all ICS systems in all industrial sectors. Further tailoring can be performed to add specificity to a particular sector (e.g., manufacturing). The ICS overlay is included as Appendix G in NIST SP 800-82, Revision 2.

ISA99 Committee The International Society of Automation (ISA) Committee on Security for Industrial Automation & Control Systems (ISA99) 500+ members Representing companies across all sectors, including: Chemical Processing Petroleum Refining Food and Beverage Energy Pharmaceuticals Water Manufacturing Copyright ISA

The ISA/IEC-62443 Series Copyright ISA

Facility Control Systems Although NIST SP 800-82 provides guidance for securing ICS, other types of control systems share similar characteristics and many of the recommendations from the guide are applicable and could be used as a reference to protect such systems against cybersecurity threats. For example, although many building, transportation, medical, security and logistics systems use different protocols, ports and services, and are configured and operate in different modes than ICS, they share similar characteristics to traditional ICS.

NIST Cybersecurity for Smart Manufacturing Systems Testbed Goal of the testbed is to measure the performance of ICS when instrumented with cybersecurity protections in accordance with practices prescribed by national and international standards and guidelines such as the NIST Cybersecurity Framework, SP 800-82 and ISA/IEC 62443 Research areas include Perimeter network security Host-based security User and device authentication Packet integrity and authentication Encryption Zone-based security Field bus (non-routable) protocol security Robust/ fault tolerant systems

NIST Cybersecurity for Smart Manufacturing Systems Testbed Reconfigurable nature of testbed will allow for researching various implementations for each scenario Process Control Collaborative Robotics Additive Manufacturing Assembly Research outcomes will be used to develop guidance for cost effectively implementing the NIST CSF in manufacturing environments without having negative performance impacts on the systems

Testbed Scenarios Continuous Processes Chemical Processing Advanced Discrete Processes Dynamic Robotic Assembly Additive Manufacturing Distributed Operations Smart Transportation Smart Grid

Process Control Scenario: The Tennessee Eastman Process Continuous process Dynamic Oscillations Integrated safety system Multiple Protocols EtherNET/IP OPC DeviceNet Hardware-in-the-loop PLC-based control

Dynamic Robotic Assembly Discrete process Cooperative robotics Dynamic Planning Integrated safety system Computer Vision Embedded control A variety of protocols including EtherCAT

Transportation Railway Track sensing & control Train Scheduling Locomotive Automotive Vehicle-vehicle communications Infrastructure sensing & control

NIST Cybersecurity for Smart Manufacturing Systems Testbed Collaborative Robotics Enclave Process Control Enclave Measurement Enclave

NIST Cybersecurity for Smart Manufacturing Systems Testbed

NIST Virtual Cybernetic Building Testbed (VCBT) The VCBT is a whole building emulator designed with enough flexibility to be capable simulating normal operation and a variety of faulty and hazardous conditions that might occur in a building where numerous building control systems are integrated together and with outside entities such as utility providers. The VCBT control hardware consists of BACnet products from multiple companies that are used for HVAC control, lighting control, physical access control, and fire detection.

Contact Info Keith Stouffer 301-975-3877 keith.stouffer@nist.gov Engineering Laboratory National Institute of Standards and Technology 100 Bureau Drive, Mail Stop 8230 Gaithersburg, MD 20899-8230 USA